In changing the storage location of a file, the command to use is_______
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
Which cells in table 3 contain numeric data with the least value?
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK | SUPPLIED | TO SENIOR | HIGH | SCHOOL |
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
The number of cells that contain data in row 1 is_________
Use Table 3 to answer the questions below
A | B | C | D | E | |
1 | BOOK SUPPLIED TO SENIOR HIGH SCHOOLS | ||||
2 | MATHS | ICT | ENGLISH | ||
3 | SHS1 | 3450 | 4500 | 5678 | |
4 | SHS11 | 8765 | 6580 | 9000 | |
5 | SHS111 | 2456 | 4009 | 4400 |
In table 3, the content of cell C5________
Which of the following items is not located on the MS Word menu bar?
In word processing, the icon in Fig.4 is used for __________
Which of the following software can be used for graphic production?
Which of the following is employed in the transfer of data between computers and a network?
A modern and a telephone connection are provided. Other things needed to be able to connect a computer to the internet are _______
The application software which allows information available on the internet to be obtained is called _________
The most cost-effective and secure way of transmitting confidential messages among the employees of an organization is the ___________
In ring topology, the computer that is allowed to transmit data possesses the ________
The acronym HTTP stands for________
Fig.3 is a flowchart above. Use it to answer the question below
The part labeled III represents________
Fig.3 is a flowchart. Use it to answer the question below
The part labelled II represents______
Fig.3 is a flowchart. Use it to answer the question below
The part labelled I represents_________
Fig.2 is a system development cycle. Use it to answer the question Above
The path labelled III is the _________?
Fig.2 is a system development cycle. Use it to answer the question below
The path labelled II is the __________?
Fig.2 is a system development cycle. Use it to answer the question below
The path labelled I is the __________?
Which of the following programming languages needs no translator for it to run?
Which of the following methods is not suitable for securing files?